Skip to content

Commit 04e64ab

Browse files
author
Tomer David Ben Zohar
committed
Init Yor
1 parent 98669d0 commit 04e64ab

File tree

9 files changed

+89
-20
lines changed

9 files changed

+89
-20
lines changed

terraform/compute.tf

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -84,5 +84,6 @@ resource "aws_instance" "eks_node" {
8484
tags = {
8585
Name = "${var.cluster_name}-worker-node"
8686
"kubernetes.io/cluster/${var.cluster_name}" = "owned"
87+
yor_trace = "90431c16-0edf-4f72-86a8-65b4cbd93720"
8788
}
8889
}

terraform/ecr.tf

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,7 @@ resource "aws_ecr_repository" "flask_webserver_repo" {
1818

1919
tags = {
2020
"project" = var.cluster_name
21+
yor_trace = "0d0a05ef-5c32-48b7-9ffe-e0665bd7f454"
2122
}
2223
}
2324

@@ -38,5 +39,6 @@ resource "aws_ecr_repository" "malware_repo" {
3839

3940
tags = {
4041
"project" = var.cluster_name
42+
yor_trace = "5a46f4a9-1a39-4255-b741-eab4a522e432"
4143
}
4244
}

terraform/eks.tf

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,8 +26,9 @@ resource "aws_eks_cluster" "my_cluster" {
2626
enabled_cluster_log_types = []
2727

2828
tags = {
29-
Name = var.cluster_name
29+
Name = var.cluster_name
3030
"aws:cloudformation:logical-id" = "EKSCluster"
3131
"aws:cloudformation:stack-name" = "eks-cluster"
32+
yor_trace = "4bb1d221-fd9b-452f-a22f-2edc482dc4c7"
3233
}
3334
}

terraform/iam.tf

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,9 @@ resource "aws_iam_role" "eks_cluster" {
1616
Principal = { Service = "eks.amazonaws.com" }
1717
}]
1818
})
19+
tags = {
20+
yor_trace = "71e80f57-5b49-4c4c-99ff-29e13e40c009"
21+
}
1922
}
2023

2124
# Attaches the required AWS-managed policy for EKS clusters to the role.
@@ -37,12 +40,18 @@ resource "aws_iam_role" "eks_node" {
3740
Principal = { Service = "ec2.amazonaws.com" }
3841
}]
3942
})
43+
tags = {
44+
yor_trace = "455d1ccd-870f-427b-bc92-bfc76ad01627"
45+
}
4046
}
4147

4248
# Creates an instance profile, which is a container for the IAM role that EC2 can use.
4349
resource "aws_iam_instance_profile" "eks_node" {
4450
name_prefix = "eks-node-profile-"
4551
role = aws_iam_role.eks_node.name
52+
tags = {
53+
yor_trace = "b72d1645-b33f-40ff-ab24-7705f483cee3"
54+
}
4655
}
4756

4857
# Attaches the standard EKS worker node policy.
@@ -84,6 +93,9 @@ data "aws_iam_policy_document" "lambda_assume_role" {
8493
resource "aws_iam_role" "cortex_custom_lambda" {
8594
name_prefix = "cortex-custom-lambda-role-"
8695
assume_role_policy = data.aws_iam_policy_document.lambda_assume_role.json
96+
tags = {
97+
yor_trace = "35f259fd-6ec8-4bd0-83e6-8349d898cc8a"
98+
}
8799
}
88100

89101
# Attaches the basic execution policy, allowing the function to write to CloudWatch Logs.
@@ -96,6 +108,9 @@ resource "aws_iam_role_policy_attachment" "cortex_custom_lambda_policy" {
96108
resource "aws_iam_role" "empty_bucket_lambda" {
97109
name_prefix = "empty-bucket-lambda-role-"
98110
assume_role_policy = data.aws_iam_policy_document.lambda_assume_role.json
111+
tags = {
112+
yor_trace = "ed83470c-52de-4607-825c-b7e2deaa7774"
113+
}
99114
}
100115

101116
# Attaches the basic execution policy.
@@ -108,4 +123,7 @@ resource "aws_iam_role_policy_attachment" "empty_bucket_lambda_policy" {
108123
resource "aws_iam_role" "cortex_custom_lambda_2" {
109124
name_prefix = "cortex-custom-lambda-2-role-"
110125
assume_role_policy = data.aws_iam_policy_document.lambda_assume_role.json
126+
tags = {
127+
yor_trace = "d31e30bd-f341-4784-8ff0-4fab123f92f3"
128+
}
111129
}

terraform/lambda.tf

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23,6 +23,9 @@ resource "aws_lambda_function" "cortex_custom_lambda" {
2323
memory_size = local.common_lambda_settings.memory_size
2424
architectures = local.common_lambda_settings.architectures
2525
timeout = 75
26+
tags = {
27+
yor_trace = "4edbaf52-b78d-4ad3-8a67-c435c4583d6f"
28+
}
2629
}
2730

2831
# Defines the Lambda function responsible for emptying S3 buckets.
@@ -38,6 +41,9 @@ resource "aws_lambda_function" "empty_bucket_lambda" {
3841
memory_size = local.common_lambda_settings.memory_size
3942
architectures = local.common_lambda_settings.architectures
4043
timeout = 600
44+
tags = {
45+
yor_trace = "d5aa41a6-602f-49eb-bdc1-a4b199c99dd3"
46+
}
4147
}
4248

4349
# Defines the second Cortex custom Lambda function.
@@ -53,4 +59,7 @@ resource "aws_lambda_function" "cortex_custom_lambda_2" {
5359
memory_size = local.common_lambda_settings.memory_size
5460
architectures = local.common_lambda_settings.architectures
5561
timeout = 75
62+
tags = {
63+
yor_trace = "8bb83fd0-d44c-41f8-989d-d53e06a2599f"
64+
}
5665
}

terraform/massaging.tf

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@ resource "aws_sns_topic" "cloudtrail_notifications" {
66

77
tags = {
88
"managed_by" = "paloaltonetworks"
9+
yor_trace = "5ace4cb8-7329-46fe-8d46-a0df687e02b2"
910
}
1011
}
1112

@@ -51,14 +52,15 @@ resource "aws_sns_topic_delivery_policy" "cloudtrail_notifications_delivery_poli
5152
resource "aws_sqs_queue" "cloudtrail_queue" {
5253
name = "cortex-cloudtrail-logs-queue-980573775279-m-a-9995931061259"
5354

54-
delay_seconds = 0
55-
max_message_size = 1048576
56-
message_retention_seconds = 345600
55+
delay_seconds = 0
56+
max_message_size = 1048576
57+
message_retention_seconds = 345600
5758
visibility_timeout_seconds = 30
58-
sqs_managed_sse_enabled = true
59+
sqs_managed_sse_enabled = true
5960

6061
tags = {
6162
"managed_by" = "paloaltonetworks"
63+
yor_trace = "da138900-c796-44a4-8007-6397c2d8bd06"
6264
}
6365
}
6466

terraform/network.tf

Lines changed: 31 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,8 @@ resource "aws_vpc" "k8s_vpc" {
1212
instance_tenancy = "default"
1313

1414
tags = {
15-
Name = "${var.cluster_name}-VPC"
15+
Name = "${var.cluster_name}-VPC"
16+
yor_trace = "a6984cd3-0504-40d2-9145-462394d34948"
1617
}
1718
}
1819

@@ -30,6 +31,7 @@ resource "aws_subnet" "public_1" {
3031
tags = {
3132
Name = "${var.cluster_name}-public-subnet-1"
3233
"kubernetes.io/role/elb" = "1"
34+
yor_trace = "2265ca48-5ec5-4eca-927e-ef714787825f"
3335
}
3436
}
3537

@@ -43,6 +45,7 @@ resource "aws_subnet" "public_2" {
4345
tags = {
4446
Name = "${var.cluster_name}-public-subnet-2"
4547
"kubernetes.io/role/elb" = "1"
48+
yor_trace = "42bde467-c9e9-49bc-8182-177fbc170ab1"
4649
}
4750
}
4851

@@ -55,6 +58,7 @@ resource "aws_subnet" "private_1" {
5558
tags = {
5659
Name = "${var.cluster_name}-private-subnet-1"
5760
"kubernetes.io/role/internal-elb" = "1"
61+
yor_trace = "0f702fcd-da42-4f9b-b0f6-ca243fc73e0e"
5862
}
5963
}
6064

@@ -67,6 +71,7 @@ resource "aws_subnet" "private_2" {
6771
tags = {
6872
Name = "${var.cluster_name}-private-subnet-2"
6973
"kubernetes.io/role/internal-elb" = "1"
74+
yor_trace = "206bb654-53df-457e-85ac-c9e0d26ae61e"
7075
}
7176
}
7277

@@ -79,36 +84,45 @@ resource "aws_subnet" "private_2" {
7984
resource "aws_internet_gateway" "k8s_igw" {
8085
vpc_id = aws_vpc.k8s_vpc.id
8186
tags = {
82-
Name = "${var.cluster_name}-IGW"
87+
Name = "${var.cluster_name}-IGW"
88+
yor_trace = "80841cf5-ccc3-4081-937b-cc28e7fba0a1"
8389
}
8490
}
8591

8692
# Allocates a static public IP address for the first NAT Gateway.
8793
resource "aws_eip" "nat_eip_1" {
8894
domain = "vpc"
89-
tags = { Name = "${var.cluster_name}-NAT1-EIP" }
95+
tags = { Name = "${var.cluster_name}-NAT1-EIP"
96+
yor_trace = "a78a1285-ff97-4689-9085-83b325e98bec"
97+
}
9098
}
9199

92100
# Allocates a static public IP address for the second NAT Gateway.
93101
resource "aws_eip" "nat_eip_2" {
94102
domain = "vpc"
95-
tags = { Name = "${var.cluster_name}-NAT2-EIP" }
103+
tags = { Name = "${var.cluster_name}-NAT2-EIP"
104+
yor_trace = "d9c3ef4d-4670-49da-adbf-7464bd3472b7"
105+
}
96106
}
97107

98108
# Creates a NAT Gateway in the first public subnet for outbound internet access from private subnets.
99109
resource "aws_nat_gateway" "nat_gateway_1" {
100110
allocation_id = aws_eip.nat_eip_1.id
101111
subnet_id = aws_subnet.public_1.id
102-
tags = { Name = "${var.cluster_name}-NAT1" }
103-
depends_on = [aws_internet_gateway.k8s_igw]
112+
tags = { Name = "${var.cluster_name}-NAT1"
113+
yor_trace = "04c561be-71d5-4e7d-9a81-3aacf3226ee7"
114+
}
115+
depends_on = [aws_internet_gateway.k8s_igw]
104116
}
105117

106118
# Creates a second NAT Gateway in the second public subnet for high availability.
107119
resource "aws_nat_gateway" "nat_gateway_2" {
108120
allocation_id = aws_eip.nat_eip_2.id
109121
subnet_id = aws_subnet.public_2.id
110-
tags = { Name = "${var.cluster_name}-NAT2" }
111-
depends_on = [aws_internet_gateway.k8s_igw]
122+
tags = { Name = "${var.cluster_name}-NAT2"
123+
yor_trace = "15907bb5-1ddb-4143-bf0a-01c1e84a05d7"
124+
}
125+
depends_on = [aws_internet_gateway.k8s_igw]
112126
}
113127

114128

@@ -119,7 +133,9 @@ resource "aws_nat_gateway" "nat_gateway_2" {
119133
# Defines a route table for the public subnets.
120134
resource "aws_route_table" "public" {
121135
vpc_id = aws_vpc.k8s_vpc.id
122-
tags = { Name = "${var.cluster_name}-Public-RT" }
136+
tags = { Name = "${var.cluster_name}-Public-RT"
137+
yor_trace = "01296ba5-e2d3-4c8d-a0a7-4e57eae19f27"
138+
}
123139
}
124140

125141
# Adds a route to the public route table that directs internet-bound traffic to the Internet Gateway.
@@ -145,7 +161,9 @@ resource "aws_route_table_association" "public_2" {
145161
# Defines a dedicated route table for the first private subnet.
146162
resource "aws_route_table" "private_1" {
147163
vpc_id = aws_vpc.k8s_vpc.id
148-
tags = { Name = "${var.cluster_name}-Private-RT-1" }
164+
tags = { Name = "${var.cluster_name}-Private-RT-1"
165+
yor_trace = "66bbd369-07a2-40aa-a8d4-0d70260eb063"
166+
}
149167
}
150168

151169
# Adds a route that directs internet-bound traffic from the private subnet to the first NAT Gateway.
@@ -165,7 +183,9 @@ resource "aws_route_table_association" "private_1" {
165183
# Defines a dedicated route table for the second private subnet.
166184
resource "aws_route_table" "private_2" {
167185
vpc_id = aws_vpc.k8s_vpc.id
168-
tags = { Name = "${var.cluster_name}-Private-RT-2" }
186+
tags = { Name = "${var.cluster_name}-Private-RT-2"
187+
yor_trace = "74914750-8b52-4d1c-b3ac-4814c62d118e"
188+
}
169189
}
170190

171191
# Adds a route that directs internet-bound traffic from the private subnet to the second NAT Gateway.

terraform/s3.tf

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,9 @@
77
# Defines the primary S3 bucket resource for storing CloudTrail logs.
88
resource "aws_s3_bucket" "cloudtrail_logs" {
99
bucket = var.cloudtrail_logs_bucket_name
10-
tags = { "managed_by" = "paloaltonetworks" }
10+
tags = { "managed_by" = "paloaltonetworks"
11+
yor_trace = "6df7191d-c4d1-4e05-9690-4784798fd344"
12+
}
1113
}
1214

1315
# Enforces settings to block all public access to the CloudTrail logs bucket.
@@ -84,6 +86,9 @@ resource "aws_s3_bucket_policy" "cloudtrail_logs_policy" {
8486
# Defines the S3 bucket used for storing CloudFormation templates.
8587
resource "aws_s3_bucket" "cf_templates" {
8688
bucket = var.cf_templates_bucket_name
89+
tags = {
90+
yor_trace = "153adb36-af2f-44fe-ab87-21c23ec927da"
91+
}
8792
}
8893

8994
# Blocks all public access to the CloudFormation templates bucket.
@@ -121,6 +126,9 @@ resource "aws_s3_bucket_server_side_encryption_configuration" "cf_templates_sse"
121126
# Defines the S3 bucket for Cortex testing purposes.
122127
resource "aws_s3_bucket" "c2c_test_cortex" {
123128
bucket = "c2c-test-cortex"
129+
tags = {
130+
yor_trace = "a04ae2fb-0741-479b-95d3-cf49fcd906f8"
131+
}
124132
}
125133

126134
# Blocks all public access to the Cortex test bucket.

terraform/security.tf

Lines changed: 11 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,9 @@ data "aws_caller_identity" "current" {}
1111
resource "aws_accessanalyzer_analyzer" "external_access" {
1212
analyzer_name = "ExternalIAMAccessAnalyzer"
1313
type = "ACCOUNT"
14+
tags = {
15+
yor_trace = "a4174ede-6f57-4284-b9fd-4c8e86d7f1e5"
16+
}
1417
}
1518

1619
# Configures account-wide settings to block all public access from security groups.
@@ -58,6 +61,7 @@ resource "aws_kms_key" "cloudtrail_key" {
5861

5962
tags = {
6063
managed_by = "paloaltonetworks"
64+
yor_trace = "74945f95-7de1-41c9-8257-e2c1a71d5bdc"
6165
}
6266
}
6367

@@ -73,7 +77,8 @@ resource "aws_security_group" "eks_control_plane_sg" {
7377
vpc_id = aws_vpc.k8s_vpc.id
7478

7579
tags = {
76-
Name = "${var.cluster_name}-control-plane-sg"
80+
Name = "${var.cluster_name}-control-plane-sg"
81+
yor_trace = "ce91c912-4314-45b5-bffb-20f547e16398"
7782
}
7883
}
7984

@@ -112,7 +117,8 @@ resource "aws_security_group" "eks_node_sg" {
112117
}
113118

114119
tags = {
115-
Name = "${var.cluster_name}-EKSNodeSG"
120+
Name = "${var.cluster_name}-EKSNodeSG"
121+
yor_trace = "13e249d9-3c5f-41fa-bbb5-351e948e3cfe"
116122
}
117123
}
118124

@@ -138,6 +144,7 @@ resource "aws_security_group" "eks_shared_sg" {
138144
tags = {
139145
Name = "eks-cluster-sg-${var.cluster_name}"
140146
"kubernetes.io/cluster/${var.cluster_name}" = "owned"
147+
yor_trace = "7baba9ed-9a90-4989-bb38-bad48762e434"
141148
}
142149
}
143150

@@ -151,6 +158,7 @@ resource "aws_default_security_group" "k8s_vpc_default" {
151158
vpc_id = aws_vpc.k8s_vpc.id
152159

153160
tags = {
154-
Name = "${var.cluster_name}-default-sg"
161+
Name = "${var.cluster_name}-default-sg"
162+
yor_trace = "6ace4199-43d0-48b6-bfff-8b54063cce58"
155163
}
156164
}

0 commit comments

Comments
 (0)